On Wed, 28 Sep 2016 05:35:51 -0000 (UTC), Henrik Carlqvist <
Henrik.C...@deadspam.com> wrote:
> On Tue, 27 Sep 2016 15:41:16 -0400, Lew Pitcher wrote:
>> On directories, you need eXecute privilege to search or use as current
>> working directory. So, your permissions of 0666 (rw-rw-rw) aren't going
>> to let anyone access the device, let alone normal users.
>
> Yes, but my permission 0666 (rw-rw-rw) was not for the mount point
> directory. It was for the device:
>
> brw-rw---- 1 root disk 8, 0 Sep 26 20:24 /dev/sda
> brw-rw---- 1 root disk 8, 1 Sep 26 20:24 /dev/sda1
> brw-rw---- 1 root disk 8, 10 Sep 26 20:24 /dev/sda10
> brw-rw---- 1 root disk 8, 11 Sep 26 20:24 /dev/sda11
> brw-rw---- 1 root disk 8, 2 Sep 26 20:24 /dev/sda2
> brw-rw---- 1 root disk 8, 3 Sep 26 20:24 /dev/sda3
> brw-rw---- 1 root disk 8, 5 Sep 26 20:24 /dev/sda5
> brw-rw---- 1 root disk 8, 6 Sep 26 20:24 /dev/sda6
> brw-rw---- 1 root disk 8, 7 Sep 26 20:24 /dev/sda7
> brw-rw---- 1 root disk 8, 8 Sep 26 20:24 /dev/sda8
> brw-rw---- 1 root disk 8, 9 Sep 26 20:24 /dev/sda9
> brw-rw-rw- 1 root plugdev 8, 16 Sep 27 20:34 /dev/sdb
>
> In the example above /dev/sdb is a removable USB device and accessible
> not only by root. The fixed disk /dev/sda with all its partitions are
> accessible only by root. Sorry I wasn't clear about the chmod.
>
> regards Henrik
My 14.2 works on Xfce.
Maybe this will help.
kprims@hawk ~ $ udisks --mount /dev/sdb1
Mounted /org/freedesktop/UDisks/devices/sdb1 at /media/CDC4-0016
grep polkit -r /etc
/etc/polkit-1/rules.d/10-org.freedesktop.NetworkManager.rules:polkit.addRule(function(action, subject) {
/etc/polkit-1/rules.d/10-org.freedesktop.NetworkManager.rules: return polkit.Result.YES;
/etc/polkit-1/rules.d/20-plugdev-group-mount-override.rules:/*
http://udisks.freedesktop.org/docs/latest/udisks-polkit-actions.html */
/etc/polkit-1/rules.d/20-plugdev-group-mount-override.rules:polkit.addRule(function(action, subject) {
/etc/polkit-1/rules.d/20-plugdev-group-mount-override.rules: return polkit.Result.YES;
/etc/polkit-1/rules.d/20-plugdev-group-mount-override.rules:polkit.addRule(function(action, subject) {
/etc/polkit-1/rules.d/20-plugdev-group-mount-override.rules: return polkit.Result.YES;
/etc/polkit-1/rules.d/50-default.rules:// Default rules for polkit
/etc/polkit-1/rules.d/50-default.rules:// See the polkit(8) man page for more information
/etc/polkit-1/rules.d/50-default.rules:// about configuring polkit.
/etc/polkit-1/rules.d/50-default.rules:polkit.addAdminRule(function(action, subject) {
/etc/shadow:polkitd:*:9797:0:::::
/etc/rc.d/rc.consolekit:# This daemon is used by polkit's console auth agent.
/etc/shadow-:polkitd:*:9797:0:::::
/etc/group-:polkitd:x:87:
/etc/group:polkitd:x:87:
/etc/xdg/autostart/polkit-gnome-authentication-agent-1.desktop:Exec=/usr/libexec/polkit-gnome-authentication-agent-1
Binary file /etc/ld.so.cache matches
/etc/passwd-:polkitd:x:87:87:PolicyKit daemon owner:/var/lib/polkit:/bin/false
/etc/passwd:polkitd:x:87:87:PolicyKit daemon owner:/var/lib/polkit:/bin/false
/etc/dbus-1/system.d/org.kde.polkitkde1.helper.conf: for polkit-kde to work. -->
/etc/dbus-1/system.d/org.kde.polkitkde1.helper.conf: <!-- Only user root can own the polkitkde1.helper service -->
/etc/dbus-1/system.d/org.kde.polkitkde1.helper.conf: <allow own="org.kde.polkitkde1.helper"/>
/etc/dbus-1/system.d/org.kde.polkitkde1.helper.conf: <!-- Allow anyone to call into the service - we'll reject callers using polkit -->
/etc/dbus-1/system.d/org.kde.polkitkde1.helper.conf: <allow send_destination="org.kde.polkitkde1.helper"/>
/etc/dbus-1/system.d/org.freedesktop.PolicyKit1.conf: <policy user="polkitd">
/etc/dbus-1/system.d/org.freedesktop.PolicyKit1.conf: <policy user="polkitd">
Hope you can read this, I didn't wrap the lines.
--
Ken P